The Week in Vulnerabilities: Cyble’s Weekly Cyber Threat Report Reveals New Flaws IT and IoT Ecosystems 

Cyble’s latest report reveals a significant increase in exploit attempts, malware campaigns, and brute-force attacks targeting IoT devices and enterprise systems worldwide. Critical vulnerabilities across various devices and software remain actively exploited, highlighting the need for rigorous patching and comprehensive security measures. #Mirai #CoinMiner #WannaCry #CVE-2025-45985 #CVE-2025-30220

Read More
Cybersecurity News | Daily Recap [12 Jul 2025]

Cybersecurity threats continue to evolve with critical vulnerabilities in Wing FTP Server, Laravel, FortiWeb, Citrix, and OpenVSX marketplace being actively exploited or patched. Major data breaches involve Louis Vuitton, McDonald’s, and Albemarle County, while AI security faces challenges from jailbreaks and national security concerns with DeepSeek. #WingFTP #Laravel #FortiWeb #Citrix #OpenVSX #LouisVuitton #McDonald’s #DeepSeek

Read More
CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch

The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway, urging federal agencies to patch within a day. Threat actors are actively testing and sharing exploits, increasing the risk of widespread attack, prompting urgent mitigation measures. #CitrixBleed2 #CVE-2025-5777

Read More
CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’

The Cybersecurity and Infrastructure Security Agency (CISA) has urgently ordered all federal civilian agencies to patch the critical vulnerability CVE-2025-5777, known as “Citrix Bleed 2,” within 24 hours to prevent exploitation. Multiple threat actors, including ransomware gangs, are actively exploiting this bug, which affects Citrix NetScaler appliances and could lead to…

Read More
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques

The article analyzes a malware variant involved in the SLOW#TEMPEST campaign, focusing on advanced obfuscation techniques such as control flow graph (CFG) obfuscation using dynamic jumps and obfuscated function calls to evade detection. It also presents methods and tools developed to de-obfuscate the malware, enabling better analysis and defense. #SLOWTEMPEST #emulation…

Read More
Critical Bluetooth Protocol Vulnerabilities Expose Devices to RCE Attacks

Security researchers have uncovered the critical “PerfektBlue” Bluetooth vulnerabilities impacting millions of vehicles and devices using OpenSynergy’s BlueSDK framework. These flaws can be exploited remotely with minimal user interaction, allowing attackers to access personal data and control vehicle systems. #PerfektBlue #OpenSynergy #BlueSDK #AutomotiveSecurity…

Read More